This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the last in a series of lectures on using the Wireshark packet-capturing program. In this video, Hills explains that while simply running Wireshark is not enough to capture all network traffic, enabling modes such as promiscuous mode on network cards allows for broader traffic capture. Hills also covers the limitations imposed by network switches, which only forward traffic to specific ports. Solutions like port mirroring and network taps for overcoming these limitations, and more advanced techniques such as MAC address table flooding and ARP spoofing are also discussed. The lecture provides a practical guide for setting up effective network monitoring and traffic analysis.

This video runs 16:15 minutes in length. Additional videos from the series and a related training scenario are available to view separately.

Add Comment

Comments

(no comments available yet)